<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tomcat</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1673-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-06-30T19:03:50Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-06-30T19:03:50Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-06-30T19:03:50Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tomcat</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for tomcat to version 9.0.20 fixes the following issues:

Security issues fixed:

- CVE-2019-0199: Fixed a denial of service in the HTTP/2 implementation related to 
  streams with excessive numbers of SETTINGS frames (bsc#1131055).
- CVE-2019-0221: Fixed a cross site scripting vulnerability with the SSI printenv command (bsc#1136085).

Non-security issues fixed: 

- Increase maximum number of threads and open files for tomcat (bsc#1111966).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-1673</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36H2KGFI64Y7Z3YTFXWV2YQODHAXC6AV/#36H2KGFI64Y7Z3YTFXWV2YQODHAXC6AV</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1673-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111966</URL>
      <Description>SUSE Bug 1111966</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1131055</URL>
      <Description>SUSE Bug 1131055</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1136085</URL>
      <Description>SUSE Bug 1136085</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-0199/</URL>
      <Description>SUSE CVE CVE-2019-0199 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-0221/</URL>
      <Description>SUSE CVE CVE-2019-0221 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-9.0.20-lp150.2.19.1">tomcat-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-admin-webapps-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-admin-webapps-9.0.20-lp150.2.19.1">tomcat-admin-webapps-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-docs-webapp-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-docs-webapp-9.0.20-lp150.2.19.1">tomcat-docs-webapp-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-el-3_0-api-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-el-3_0-api-9.0.20-lp150.2.19.1">tomcat-el-3_0-api-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-embed-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-embed-9.0.20-lp150.2.19.1">tomcat-embed-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-javadoc-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-javadoc-9.0.20-lp150.2.19.1">tomcat-javadoc-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-jsp-2_3-api-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-jsp-2_3-api-9.0.20-lp150.2.19.1">tomcat-jsp-2_3-api-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-jsvc-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-jsvc-9.0.20-lp150.2.19.1">tomcat-jsvc-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-lib-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-lib-9.0.20-lp150.2.19.1">tomcat-lib-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-servlet-4_0-api-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-servlet-4_0-api-9.0.20-lp150.2.19.1">tomcat-servlet-4_0-api-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-webapps-9.0.20-lp150.2.19.1">
      <FullProductName ProductID="tomcat-webapps-9.0.20-lp150.2.19.1">tomcat-webapps-9.0.20-lp150.2.19.1</FullProductName>
    </Branch>
    <Relationship ProductReference="tomcat-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-9.0.20-lp150.2.19.1">tomcat-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-admin-webapps-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-admin-webapps-9.0.20-lp150.2.19.1">tomcat-admin-webapps-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-docs-webapp-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-docs-webapp-9.0.20-lp150.2.19.1">tomcat-docs-webapp-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-el-3_0-api-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-el-3_0-api-9.0.20-lp150.2.19.1">tomcat-el-3_0-api-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-embed-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-embed-9.0.20-lp150.2.19.1">tomcat-embed-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-javadoc-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-javadoc-9.0.20-lp150.2.19.1">tomcat-javadoc-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsp-2_3-api-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-jsp-2_3-api-9.0.20-lp150.2.19.1">tomcat-jsp-2_3-api-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsvc-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-jsvc-9.0.20-lp150.2.19.1">tomcat-jsvc-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-lib-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-lib-9.0.20-lp150.2.19.1">tomcat-lib-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-servlet-4_0-api-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-servlet-4_0-api-9.0.20-lp150.2.19.1">tomcat-servlet-4_0-api-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-webapps-9.0.20-lp150.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:tomcat-webapps-9.0.20-lp150.2.19.1">tomcat-webapps-9.0.20-lp150.2.19.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.</Note>
    </Notes>
    <CVE>CVE-2019-0199</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:tomcat-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-admin-webapps-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-docs-webapp-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-el-3_0-api-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-embed-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-javadoc-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-jsp-2_3-api-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-jsvc-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-lib-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-servlet-4_0-api-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-webapps-9.0.20-lp150.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36H2KGFI64Y7Z3YTFXWV2YQODHAXC6AV/#36H2KGFI64Y7Z3YTFXWV2YQODHAXC6AV</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-0199.html</URL>
        <Description>CVE-2019-0199</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131055</URL>
        <Description>SUSE Bug 1131055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1139924</URL>
        <Description>SUSE Bug 1139924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.</Note>
    </Notes>
    <CVE>CVE-2019-0221</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:tomcat-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-admin-webapps-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-docs-webapp-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-el-3_0-api-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-embed-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-javadoc-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-jsp-2_3-api-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-jsvc-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-lib-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-servlet-4_0-api-9.0.20-lp150.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.0:tomcat-webapps-9.0.20-lp150.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36H2KGFI64Y7Z3YTFXWV2YQODHAXC6AV/#36H2KGFI64Y7Z3YTFXWV2YQODHAXC6AV</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-0221.html</URL>
        <Description>CVE-2019-0221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136085</URL>
        <Description>SUSE Bug 1136085</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
